Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
墓志铭 Epitaph
v1.0.0Scan all your social media accounts, distill your entire digital existence into a "Digital Epitaph" — a poetic, data-driven summary of who you really were on...
⭐ 0· 49·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Functionally the skill legitimately needs a browser automation helper (ManoBrowser) and many in-browser JS scrapers to read logged‑in social pages; however the skill metadata declares no required binaries/env but the runtime instructions depend on git/curl/unzip, a ManoBrowser plugin and an MCP endpoint/API key. That metadata ↔ runtime mismatch is incoherent and hides required capabilities from the installer.
Instruction Scope
SKILL.md instructs the agent to (1) auto-detect and, if missing, automatically download ManoBrowser from GitHub, (2) read other skills' SKILL.md files, and (3) inject/execute detailed JS in the user's browser context (chrome_execute_script) that runs with cookies and page JS (window.__INITIAL_STATE__, window.$CONFIG, etc.). Those scripts access logged-in session data and full page content — appropriate for the stated scraping purpose but high‑sensitivity in scope and capable of collecting any data accessible in the browser.
Install Mechanism
There is no declared install spec, but the instructions tell the agent to run git clone or curl+unzip to pull ManoBrowser from GitHub into the local skills dir. Automatically fetching and placing third-party code on disk (and instructing to execute in-browser scripts) increases risk; the repo and any post‑install behaviour of the plugin are not pinned or verified (no checksums/commit hashes), and example endpoints in docs reference an external domain (datasaver.deepminingai.com) which should be validated.
Credentials
The skill declares no required env vars/credentials, yet it expects an MCP endpoint and API key (ManoBrowser configuration) to be present or configured (check_manobrowser.sh and SKILL.md). That effectively requires sensitive configuration (endpoint + API key) to let the skill control a browser device; the skill also instructs injecting scripts that use browser cookies (fetch with credentials), so the potential access to account session tokens is high. The requested access is plausible for the purpose, but the lack of explicit declared requirements and lack of guidance about trusted MCP endpoints is a red flag.
Persistence & Privilege
always:false (good). The skill writes files when it auto-clones ManoBrowser into the local skills dir and stores collected data under epitaph-data/; that is expected for this functionality. It does not request global/system config edits beyond adding a skill folder, but the automatic install behavior (without asking) and the requirement to configure an MCP endpoint/API key warrant user supervision.
What to consider before installing
This skill is coherent with its goal (it needs a browser plugin and in‑browser scripts to read logged‑in social pages), but it does a number of things you should review before installing:
- It will attempt to auto-download and place a ManoBrowser plugin/skill from GitHub into your skills directory (uses git/curl/unzip). Prefer to perform that install manually after you review the repository and a specific commit hash. Do not allow silent, unattended downloads.
- The skill runs JavaScript inside your browser (via chrome_execute_script) that reads cookies, page JS objects (window.__INITIAL_STATE__, window.$CONFIG), and performs XHR interception — this gives it access to anything your logged‑in browser can see. Only run it on accounts you trust and on machines you control.
- The workflow expects an MCP endpoint + API key (ManoBrowser configuration). Verify where that MCP endpoint points and that it is a trusted/local device; if the MCP endpoint is remote or you don't control it, scraped data (or browser control) could be transmitted off your machine. Do not use unknown endpoints.
- Metadata omits required tools (git/curl/unzip) and credential/config expectations; treat that as a packaging/quality issue. Ask the skill author to declare required binaries and to provide checksums or pinned commits for any automatic downloads.
- If you decide to try it: 1) manually clone and inspect the ManoBrowser repo and this skill's JS scripts before running; 2) prefer manual installation and explicit consent prompts rather than automatic install; 3) test on a throwaway account first; 4) ensure epitaph-data/ is stored locally and that no upload occurs to unknown servers.
What would change this assessment: explicit, pinned install artifacts (commit hashes/checksums), a declared install spec rather than silent cloning, and clear instructions ensuring MCP endpoint is local/trusted (or a guarantee that no remote upload occurs). If the skill required and declared those items, its classification could move toward benign.Like a lobster shell, security has layers — review code before you run it.
latestvk97dz8dk7pfzwhpb9trv2rfcks84cdt3
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
